Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:45
Static task
static1
Behavioral task
behavioral1
Sample
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe
Resource
win10v2004-20220812-en
General
-
Target
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe
-
Size
378KB
-
MD5
edaaaa6527a6f42c96f27ce2e427cd39
-
SHA1
0a19faa00081cf79bebaf16bb83aa114d0a5d166
-
SHA256
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f
-
SHA512
799d38539e59b1df07d93c71d42ced5fd7bfadd6598d13ff5cfebce3d62f3b327022c16ad74b2e329c60a323bb128384336ca86db5bdc3d1cb290f420632fa9f
-
SSDEEP
6144:5kl8N2FwUw+h8MYiN8FHiYTDAcZuEao4lpzN+f7BpIfjfZSWYr7p:elPCUD2V3PAUabB+LMoWG7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
alter.exepid process 3708 alter.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
alter.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run alter.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\alter.exe" alter.exe -
Drops file in System32 directory 2 IoCs
Processes:
description ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\whr458da.db File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\whr458da.db -
Drops file in Windows directory 2 IoCs
Processes:
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exealter.exedescription ioc process File opened for modification C:\Windows\ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.INI ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe File opened for modification C:\Windows\alter.INI alter.exe -
Modifies data under HKEY_USERS 8 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
alter.exepid process 3708 alter.exe 3708 alter.exe 3708 alter.exe 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 780 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
alter.exepid process 3708 alter.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
alter.exedescription pid process Token: SeDebugPrivilege 3708 alter.exe Token: SeDebugPrivilege 780 -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exealter.exepid process 4400 ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe 4400 ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe 3708 alter.exe 3708 alter.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exedescription pid process target process PID 4400 wrote to memory of 3708 4400 ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe alter.exe PID 4400 wrote to memory of 3708 4400 ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe alter.exe PID 4400 wrote to memory of 3708 4400 ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe alter.exe PID 780 wrote to memory of 1744 780 wmiprvse.exe PID 780 wrote to memory of 1744 780 wmiprvse.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe"C:\Users\Admin\AppData\Local\Temp\ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\alter.exeC:\Users\Admin\AppData\Local\Temp\ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:1744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5edaaaa6527a6f42c96f27ce2e427cd39
SHA10a19faa00081cf79bebaf16bb83aa114d0a5d166
SHA256ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f
SHA512799d38539e59b1df07d93c71d42ced5fd7bfadd6598d13ff5cfebce3d62f3b327022c16ad74b2e329c60a323bb128384336ca86db5bdc3d1cb290f420632fa9f
-
Filesize
378KB
MD5edaaaa6527a6f42c96f27ce2e427cd39
SHA10a19faa00081cf79bebaf16bb83aa114d0a5d166
SHA256ef159da6f5e731940edd84ad972cb11b38d6d1933edb0531b6f788de8353005f
SHA512799d38539e59b1df07d93c71d42ced5fd7bfadd6598d13ff5cfebce3d62f3b327022c16ad74b2e329c60a323bb128384336ca86db5bdc3d1cb290f420632fa9f